]] Christoph Anton Mitterer 

> A user of Debian already fully trusts us (by using our distro, where we
> could do basically everything).

That user trusts us to build a distro fairly competently, something we
have a history of doing.

> If he ultimately trusts our X.509 root, he doesn't give us more trust,
> than he already did.

That user would then trust us to run a CA competently, something we as a
project don't have a history of doing, so they have no reason to believe
we can do so.

Running a good CA is not a trivial effort.

> Of course this still doesn't solve the problem of e.g. browsers, that
> they have gazillions of CAs, and each could issue forged certs for
> Debian hosts, but at least it technically allows the user (or programs
> like apt-listbugs) to _really fully securely_ contact Debian services
> via TLS/SSL with X.509 - something which is not possible with
> GANDI/CAcert or any other non-Debian-managed CAs.

Either cert pinning or DTLSA records would be better solutions here.

-- 
Tollef Fog Heen
UNIX is user friendly, it's just picky about who its friends are


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/87simyjpgd....@aexonyam.err.no

Reply via email to